Post-quantum cryptography has a strong impact on Entrust Datacard's main business areas:
on SSL, PKI, as well as on the authentication business.
written on Feb 19, 2019
by Utimaco
written on Feb 14, 2019
by Asim Mehmood
written on Feb 11, 2019
by Utimaco
written on Feb 05, 2019
by Terry Anton
written on Feb 04, 2019
by Utimaco
Post-quantum cryptography has a strong impact on Entrust Datacard's main business areas:
on SSL, PKI, as well as on the authentication business.
It has taken over two decades to establish and secure the current e-commerce applications. The security of most of these systems principally relies on cryptographic algorithms which have served the purpose till now. Since the initiation and evolution of quantum computing, some cryptographic algorithms have threats. To mitigate the security gap, numerous post-quantum algorithms have been proposed. This article enlightens the journey towards post-quantum algorithms and security parameters of the newly proposed post-quantum algorithms.
Read moreIn this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.
Read moreWith every passing day, the need for crypto agility becomes more and more important. Whether you believe quantum computing is 10 years, 20 years or more away, the inevitability is that it is approaching fast. In the world of cryptography, Key Management Systems (KMS) are already well down the path of developing technologies for a quantum world. However, the KMS is only one portion of a total cryptography solution. This is why many leading technology organizations have begun research on Hardware Security Modules (HSMs) and their role in crypto agility.
Read moreQuantum computing will decimate the security infrastructure of the digital economy. Quantum computing in general is certainly a blessing to humanity in many respects and it promises to disrupt evolution of technology in more than one dimensions. But it is also a curse to security, as cryptographic algorithms that proved to be secure for decade may be breached by quantum computers within minutes.
Read moreParagraph 17 FamilyRoboto, sans-serif; Style normal Size17px Line Height29pxColor#666666
Paragraph 17 FamilyRoboto, sans-serif; Style normal Size17px Line Height29pxColor#666666
Paragraph 17 FamilyRoboto, sans-serif; Style normal Size17px Line Height29pxColor#666666
Utimaco IS GmbH
Germanusstraße 4
52080 Aachen
Germany
Phone: + 49 241 1696 200
Utimaco Inc.
900 E Hamilton Ave., Suite 400
Campbell, CA 95008
USA
Phone: +1 844 UTIMACO
Utimaco IS GmbH – Office APAC
One Raffles Quay, North Tower
Level 25
Singapore 048583
Phone: +65 6622 5347